Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

Ransomware hackers target major Citrix NetScaler flaw

  • August 30, 2023
Total
0
Shares
0
0
0


Cybersecurity researchers from Sophos have discovered a new hacking campaign in which the threat actors leveraged a known vulnerability to conduct domain-wide attacks. 

According to the researchers’ report, a group called ‘STAC4663’ managed to exploit CVE-2023-3519 to infiltrate vulnerable systems and deploy all sorts of malicious software. The exploit is a remote code execution vulnerability discovered earlier this summer in Citrix NetScaler systems. 

Citrix released a patch for the flaw in mid-July this year however Sophos’ report has found not all organizations have applied the patch, leaving their systems vulnerable to malicious third-party penetration. 

Links to FIN8

Now, Sophos is warning that simply patching the endpoints will not suffice – organizations will also need to thoroughly inspect their networks and endpoints for signs of potential compromise. To do that, businesses should analyze historical data and look for identified Indicators of Compromise (IoC), which can be found here.  

The researchers also said that their findings “align closely” with the report published by Fox-IT earlier this month. In this report, the researchers said they found some 2,000 Citrix NetScaler systems compromised due to CVE-2023-3519.

On the day the report was published (August 14), Fox-IT said 1,828 NetScaler servers were compromised, despite the fact that 1,248 were previously patched against the flaw. “A patched NetScaler can still contain a backdoor,” the researchers explained. “It is recommended to perform an Indicator of Compromise check on your NetScalers, regardless of when the patch was applied.” 

The threat actor being attributed with this campaign – STAC4663 – is being linked to FIN8, BleepingComputer reports. 

FIN8 is being described as a financially-motivated threat actor, active since at least early 2016. It is also known as Syssphinx, and usually targets businesses in retail, hospitality, healthcare, and entertainment verticals. Its attacks often end with ransomware, as the group was seen deploying different encryptors, including BlackCat.

Via: Infosecurity Magazine




Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • Technology

Generative AI startup AI21 Labs lands $155M at a $1.4B valuation

  • August 30, 2023
View Post
Next Article
  • News

New Samsung Food app can help you master the art of cooking right at home

  • August 30, 2023
View Post
You May Also Like
View Post
  • News

Roku Express 4K bundle arrives to tempt you away from the Fire Stick 4K

  • September 27, 2023
View Post
  • News

One-off Nikon 135mm ‘Plena’ lens promises flawless bokeh for portrait photographers

  • September 27, 2023
View Post
  • News

E.U. Law Sets the Stage for a Clash Over Disinformation

  • September 27, 2023
View Post
  • News

Quordle today – hints and answers for Wednesday, September 27 (game #611)

  • September 26, 2023
View Post
  • News

FTC Says Amazon Used These Tactics to Undermine Competition

  • September 26, 2023
View Post
  • News

Here Are the 2 Tactics Amazon Used to Undermine Competition, the F.T.C. Says

  • September 26, 2023
View Post
  • News

The laptop that weighs less than the Apple iPad Pro tablet has been refreshed — shame no one noticed

  • September 26, 2023
View Post
  • News

I was excited about the battery life on the Surface Laptop Studio 2… then I read the small print

  • September 26, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.